CN107370664A - A kind of effective microblogging junk user finds system - Google Patents
A kind of effective microblogging junk user finds system Download PDFInfo
- Publication number
- CN107370664A CN107370664A CN201710582712.2A CN201710582712A CN107370664A CN 107370664 A CN107370664 A CN 107370664A CN 201710582712 A CN201710582712 A CN 201710582712A CN 107370664 A CN107370664 A CN 107370664A
- Authority
- CN
- China
- Prior art keywords
- user
- mrow
- msub
- junk
- feature
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/52—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/951—Indexing; Web crawling techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/24—Classification techniques
- G06F18/241—Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches
- G06F18/2411—Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches based on the proximity to a decision surface, e.g. support vector machines
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Databases & Information Systems (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Bioinformatics & Computational Biology (AREA)
- Evolutionary Computation (AREA)
- Evolutionary Biology (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Artificial Intelligence (AREA)
- Life Sciences & Earth Sciences (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention provides a kind of effective microblogging junk user to find system, including modeling module, user's sort module and junk user determining module, the modeling module is used to establish microblog users network model, user's sort module is classified based on microblog users network model to microblog users, and the junk user determining module determines the junk user in microblog users based on user's classification;The microblog users network model is established based on user's concern relation, is specially:It regard the digraph H=(W, B) that user's concern relation in microblogging is formed as microblog users network model, wherein, W is microblog users set, and B is side collection, if user has concern relation, side be present between user.Beneficial effects of the present invention are:Microblog users network is modeled based on the concern relation of microblog users, can effectively find the junk user in microblogging.
Description
Technical field
The present invention relates to technical field of microblog, and in particular to a kind of effective microblogging junk user finds system.
Background technology
Microblogging is quick in netizen by characteristics such as opening, termination extension, content terseness and the low thresholds of platform
Infiltration, develops into an important social media, and it not only turns into netizen and obtains news and current affairs, human communication, self table
Reach, society shares and the important medium of communal participation, also as social public opinion, brand names and product promotion, tradition
The Important Platform of broadcasting media.However, with microblogging service popularization with it is fast-developing, exist largely with spy privacy information,
Business marketing, raise user's popularity, manufacture and link with propagating the artificial rubbish for the purpose of public opinion etc. and junk user.How to send out
Existing junk user, createing good network environment turns into problem of the pendulum in face of people.
The content of the invention
In view of the above-mentioned problems, the present invention is intended to provide a kind of effective microblogging junk user finds system.
The purpose of the present invention is realized using following technical scheme:
Provide a kind of effective microblogging junk user and find system, including modeling module, user's sort module and rubbish
User's determining module, the modeling module are used to establish microblog users network model, and user's sort module is used based on microblogging
Family network model is classified to microblog users, and the junk user determining module is classified based on user to be determined in microblog users
Junk user;The microblog users network model is established based on user's concern relation, is specially:By user's concern relation in microblogging
The digraph H=(W, B) of formation is used as microblog users network model, wherein, W is microblog users set, and B is side collection, if with
There is concern relation in family, then side be present between user.
Beneficial effects of the present invention are:Microblog users network is modeled based on the concern relation of microblog users, can
Effectively find the junk user in microblogging.
Brief description of the drawings
Using accompanying drawing, the invention will be further described, but the embodiment in accompanying drawing does not form any limit to the present invention
System, for one of ordinary skill in the art, on the premise of not paying creative work, can also be obtained according to the following drawings
Other accompanying drawings.
Fig. 1 is the structural representation of the present invention;
Fig. 2 is user's sort module structural representation of the present invention.
Reference:
Embodiment
The invention will be further described with the following Examples.
Referring to Fig. 1, Fig. 2, a kind of effective microblogging junk user of the present embodiment finds system, including modeling module 1, use
Family sort module 2 and junk user determining module 3, the modeling module 1 are used to establish microblog users network model, the user
Sort module 2 is classified based on microblog users network model to microblog users, and the junk user determining module 3 is based on user
Classification determines the junk user in microblog users;The microblog users network model is established based on user's concern relation, is specially:
It regard the digraph H=(W, B) that user's concern relation in microblogging is formed as microblog users network model, wherein, W is microblog users
Set, B is side collection, if user has concern relation, side be present between user.
The present embodiment is modeled based on the concern relation of microblog users to microblog users network, can effectively be found micro-
Junk user in rich.
Preferably, user's sort module 2 includes characteristic of division determining unit and taxon, and the characteristic of division is true
Order member is used to determine the feature for classifying, and the taxon is used to determine class of subscriber according to characteristic of division;Described point
Category feature determining unit includes junk user characteristic of division determination subelement and normal users characteristic of division determination subelement, described
Junk user characteristic of division determination subelement is used to determine the feature for judging junk user, and the normal users characteristic of division determines
Subelement is used to determine the feature for judging normal users.
The feature for judging junk user includes the first junk user feature F1With the second junk user feature F2:
The first junk user feature determines in the following ways:Calculate the first junk user characteristic index of user:
In formula, p (xi) represent the time series of user being divided into m subsequence, xthiIndividual subsequence is published the news number
The ratio of total time sequence is accounted for, if wl1≥T1, then the user meet the first junk user feature, T1For given threshold;
The second junk user feature determines in the following ways:Calculate the second junk user characteristic index of user:
In formula, d1Represent the message number that user includes "@" in publishing the news, l1Represent that user includes in publishing the news
The message number of " http//", d represent the message sum that user delivers;If wl2≥T2, then it represents that user meets the second rubbish
User characteristics, T2For given threshold.
The feature for judging normal users includes the first normal users feature C1With the second normal users feature C2:
The first normal users feature determines in the following ways:Calculate the first normal users characteristic index of user:
If wz1≤T3, then the user meet the first normal users feature, T3For given threshold;
The second normal users feature determines in the following ways:Calculate the second normal users characteristic index of user:
If wz2≤T4, then it represents that user meets the second normal users feature, T4For given threshold.
This preferred embodiment Overall Acquisition user's various features, is used to be follow-up by establishing a variety of classification judging characteristics
Family classification is laid a good foundation, specifically, the first junk user characteristic index and the first normal users characteristic index reflect user
Rule of posting, the second junk user characteristic index closes the second normal users characteristic index and reflects the transmission junk information of user
Situation.
Preferably, the taxon determines class of subscriber in the following ways:
(1) for any user w ∈ W, the characteristic set F={ F for judging junk user are giveni, i=1,2, if met
The ith feature of junk user, then it can be high as the probability of junk user, if only existing a feature so that user w has
Higher probability is junk user, then the user is doubtful junk user, if there is two features so that user w has higher
Probability be junk user, then the user is approximate junk user;
(2) for any user w ∈ W, the characteristic set C={ C for judging normal users are givenj, j=1,2, if met
J-th of feature of normal users, then it can be high as the probability of normal users, if only existing a feature so that user w has
Higher probability is normal users, then the user is doubtful normal users, if there is two features so that user w has higher
Probability be normal users, then the user is approximate normal users;
(3) for any user w ∈ W, if being both unsatisfactory for junk user judges feature, also it is unsatisfactory for normal users judgement
Feature, then user w is uncertain user.
This preferred embodiment is realized by determining that the feature of junk user and the feature of normal users determine class of subscriber
The Accurate classification of user, specifically, the quantitative determination user by meeting feature belong to the general of junk user and normal users
Rate, determine that junk user is laid a good foundation to be follow-up.
Preferably, the junk user determining module 3 determines junk user in the following ways:
(1) user's score DF is calculated:
In formula, a1Represent the number that user is paid close attention to by doubtful normal users, a2Represent what user was paid close attention to by approximate normal users
Number, b1Represent that user pays close attention to the number of doubtful junk user, b2Represent that user pays close attention to the number of approximate junk user;
(2) if user is approximate junk user and meets user's score DF>0.2, if user is doubtful junk user and expired
Sufficient user's score DF>0.5, if user is uncertain user and meets user's score DF>1, if user be doubtful normal users and
Meet user's score DF>2, if user is approximate normal users and meets user's score DF>4, then user is defined as rubbish and used
Family, it is otherwise normal users.
Statistical nature judgement is only relied on, the unconspicuous junk user of Partial Feature may be missed, this preferred embodiment uses
User's score determines junk user with the mode that feature is combined, and reduces the False Rate of junk user discovery, improves rubbish
The discovery accuracy rate of user.
Find that system excavates junk user, the junk user number point of excavation using effective microblogging junk user of the invention
Not Wei 10,20,30,40,50 when, accuracy rate, which counts, to be found to junk user discovery time and junk user, compared with rubbish
Rubbish user has found that system is compared, caused to have the beneficial effect that shown in table:
Junk user number | Junk user discovery time shortens | Junk user finds that accuracy rate improves |
10 | 23% | 21% |
20 | 25% | 20% |
30 | 24% | 25% |
40 | 26% | 22% |
50 | 24% | 23% |
Finally it should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention, rather than the present invention is protected
The limitation of scope is protected, although being explained with reference to preferred embodiment to the present invention, one of ordinary skill in the art should
Work as understanding, technical scheme can be modified or equivalent substitution, without departing from the reality of technical solution of the present invention
Matter and scope.
Claims (6)
1. a kind of effective microblogging junk user finds system, it is characterised in that including modeling module, user's sort module and rubbish
Rubbish user's determining module, the modeling module are used to establish microblog users network model, and user's sort module is based on microblogging
User network model is classified to microblog users, and the junk user determining module is based on user's classification and determined in microblog users
Junk user;The microblog users network model is established based on user's concern relation, is specially:User in microblogging is paid close attention to and closed
The digraph H=(W, B) that system is formed is used as microblog users network model, wherein, W is microblog users set, and B is side collection, if
There is concern relation in user, then side be present between user.
2. effective microblogging junk user according to claim 1 finds system, it is characterised in that user's classification mould
Block includes characteristic of division determining unit and taxon, and the characteristic of division determining unit is used to determine the feature for classifying,
The taxon is used to determine class of subscriber according to characteristic of division;The characteristic of division determining unit is classified including junk user
Feature determination subelement and normal users characteristic of division determination subelement, the junk user characteristic of division determination subelement are used for
It is determined that judging the feature of junk user, the normal users characteristic of division determination subelement is used to determine the spy for judging normal users
Sign.
3. effective microblogging junk user according to claim 2 finds system, it is characterised in that the judgement rubbish is used
The feature at family includes the first junk user feature F1With the second junk user feature F2:
The first junk user feature determines in the following ways:Calculate the first junk user characteristic index of user:
<mrow>
<msub>
<mi>wl</mi>
<mn>1</mn>
</msub>
<mo>=</mo>
<msqrt>
<mrow>
<mo>-</mo>
<munder>
<mi>&Sigma;</mi>
<mrow>
<mn>0</mn>
<mo>&le;</mo>
<msub>
<mi>x</mi>
<mi>i</mi>
</msub>
<mo>&le;</mo>
<mi>m</mi>
</mrow>
</munder>
<mi>p</mi>
<mrow>
<mo>(</mo>
<msub>
<mi>x</mi>
<mi>i</mi>
</msub>
<mo>)</mo>
</mrow>
<mi>ln</mi>
<mrow>
<mo>&lsqb;</mo>
<mrow>
<mi>p</mi>
<mrow>
<mo>(</mo>
<msub>
<mi>x</mi>
<mi>i</mi>
</msub>
<mo>)</mo>
</mrow>
</mrow>
<mo>&rsqb;</mo>
</mrow>
</mrow>
</msqrt>
<mo>-</mo>
<munder>
<mi>&Sigma;</mi>
<mrow>
<mn>0</mn>
<mo>&le;</mo>
<msub>
<mi>x</mi>
<mi>i</mi>
</msub>
<mo>&le;</mo>
<mi>m</mi>
</mrow>
</munder>
<mi>p</mi>
<mrow>
<mo>(</mo>
<msub>
<mi>x</mi>
<mi>i</mi>
</msub>
<mo>)</mo>
</mrow>
<mi>ln</mi>
<mrow>
<mo>&lsqb;</mo>
<mrow>
<mi>p</mi>
<mrow>
<mo>(</mo>
<msub>
<mi>x</mi>
<mi>i</mi>
</msub>
<mo>)</mo>
</mrow>
</mrow>
<mo>&rsqb;</mo>
</mrow>
<mo>/</mo>
<munder>
<mi>&Sigma;</mi>
<mrow>
<mn>0</mn>
<mo>&le;</mo>
<msub>
<mi>x</mi>
<mi>i</mi>
</msub>
<mo>&le;</mo>
<mi>m</mi>
</mrow>
</munder>
<mfrac>
<mn>1</mn>
<mi>m</mi>
</mfrac>
<mi>log</mi>
<mfrac>
<mn>1</mn>
<mi>m</mi>
</mfrac>
</mrow>
In formula, p (xi) represent the time series of user being divided into m subsequence, xthiIndividual subsequence number of publishing the news accounts for always
The ratio of time series, if wl1≥T1, then the user meet the first junk user feature, T1For given threshold;
The second junk user feature determines in the following ways:Calculate the second junk user characteristic index of user:
<mrow>
<msub>
<mi>wl</mi>
<mn>2</mn>
</msub>
<mo>=</mo>
<msup>
<mi>e</mi>
<mrow>
<msub>
<mi>d</mi>
<mn>1</mn>
</msub>
<mo>+</mo>
<msub>
<mi>l</mi>
<mn>1</mn>
</msub>
</mrow>
</msup>
<mo>+</mo>
<msup>
<mrow>
<mo>(</mo>
<mfrac>
<mrow>
<msub>
<mi>d</mi>
<mn>1</mn>
</msub>
<mo>+</mo>
<msub>
<mi>l</mi>
<mn>1</mn>
</msub>
</mrow>
<mi>d</mi>
</mfrac>
<mo>)</mo>
</mrow>
<mn>2</mn>
</msup>
</mrow>
In formula, d1Represent the message number that user includes "@" in publishing the news, l1Represent that user includes in publishing the news
The message number of " http//", d represent the message sum that user delivers;If wl2≥T2, then it represents that user meets the second rubbish
User characteristics, T2For given threshold.
4. effective microblogging junk user according to claim 3 finds system, it is characterised in that the judgement is just conventional
The feature at family includes the first normal users feature C1With the second normal users feature C2:
The first normal users feature determines in the following ways:Calculate the first normal users characteristic index of user:
<mrow>
<msub>
<mi>wz</mi>
<mn>1</mn>
</msub>
<mo>=</mo>
<msup>
<mrow>
<mo>{</mo>
<mrow>
<mo>-</mo>
<munder>
<mi>&Sigma;</mi>
<mrow>
<mn>0</mn>
<mo>&le;</mo>
<msub>
<mi>x</mi>
<mi>i</mi>
</msub>
<mo>&le;</mo>
<mi>m</mi>
</mrow>
</munder>
<mi>p</mi>
<mrow>
<mo>(</mo>
<msub>
<mi>x</mi>
<mi>i</mi>
</msub>
<mo>)</mo>
</mrow>
<mi>ln</mi>
<mrow>
<mo>&lsqb;</mo>
<mrow>
<mi>p</mi>
<mrow>
<mo>(</mo>
<msub>
<mi>x</mi>
<mi>i</mi>
</msub>
<mo>)</mo>
</mrow>
</mrow>
<mo>&rsqb;</mo>
</mrow>
</mrow>
<mo>}</mo>
</mrow>
<mn>2</mn>
</msup>
<mo>/</mo>
<munder>
<mi>&Sigma;</mi>
<mrow>
<mn>0</mn>
<mo>&le;</mo>
<msub>
<mi>x</mi>
<mi>i</mi>
</msub>
<mo>&le;</mo>
<mi>m</mi>
</mrow>
</munder>
<mfrac>
<mn>1</mn>
<mi>m</mi>
</mfrac>
<mi>log</mi>
<mfrac>
<mn>1</mn>
<mi>m</mi>
</mfrac>
<mo>-</mo>
<munder>
<mi>&Sigma;</mi>
<mrow>
<mn>0</mn>
<mo>&le;</mo>
<msub>
<mi>x</mi>
<mi>i</mi>
</msub>
<mo>&le;</mo>
<mi>m</mi>
</mrow>
</munder>
<mi>p</mi>
<mrow>
<mo>(</mo>
<msub>
<mi>x</mi>
<mi>i</mi>
</msub>
<mo>)</mo>
</mrow>
<mi>ln</mi>
<mrow>
<mo>&lsqb;</mo>
<mrow>
<mi>p</mi>
<mrow>
<mo>(</mo>
<msub>
<mi>x</mi>
<mi>i</mi>
</msub>
<mo>)</mo>
</mrow>
</mrow>
<mo>&rsqb;</mo>
</mrow>
</mrow>
If wz1≤T3, then the user meet the first normal users feature, T3For given threshold;
The second normal users feature determines in the following ways:Calculate the second normal users characteristic index of user:
<mrow>
<msub>
<mi>wz</mi>
<mn>2</mn>
</msub>
<mo>=</mo>
<msqrt>
<msup>
<mi>e</mi>
<mrow>
<msub>
<mi>d</mi>
<mn>1</mn>
</msub>
<mo>+</mo>
<msub>
<mi>l</mi>
<mn>1</mn>
</msub>
</mrow>
</msup>
</msqrt>
<mo>&times;</mo>
<mfrac>
<mrow>
<msub>
<mi>d</mi>
<mn>1</mn>
</msub>
<mo>+</mo>
<msub>
<mi>l</mi>
<mn>1</mn>
</msub>
</mrow>
<mi>d</mi>
</mfrac>
</mrow>
If wz2≤T4, then it represents that user meets the second normal users feature, T4For given threshold.
5. effective microblogging junk user according to claim 4 finds system, it is characterised in that the taxon is adopted
Class of subscriber is determined with the following methods:
(1) for any user w ∈ W, the characteristic set F={ F for judging junk user are giveni, i=1,2, if meeting rubbish
The ith feature of user, then it can be high as the probability of junk user, if only existing a feature so that user w has higher
Probability be junk user, then the user is doubtful junk user, if there is two features so that user w has higher general
Rate is junk user, then the user is approximate junk user;
(2) for any user w ∈ W, the characteristic set C={ C for judging normal users are givenj, j=1,2, if met normal
J-th of feature of user, then it can be high as the probability of normal users, if only existing a feature so that user w has higher
Probability be normal users, then the user is doubtful normal users, if there is two features so that user w has higher general
Rate is normal users, then the user is approximate normal users;
(3) for any user w ∈ W, if being both unsatisfactory for junk user judges feature, normal users is also unsatisfactory for and judge spy
Sign, then user w is uncertain user.
6. effective microblogging junk user according to claim 5 finds system, it is characterised in that the junk user is true
Cover half block determines junk user in the following ways:
(1) user's score DF is calculated:
<mrow>
<mi>D</mi>
<mi>F</mi>
<mo>=</mo>
<msqrt>
<mrow>
<msup>
<mrow>
<mo>(</mo>
<mfrac>
<mrow>
<msub>
<mi>b</mi>
<mn>1</mn>
</msub>
<mo>+</mo>
<mn>2</mn>
<msub>
<mi>b</mi>
<mn>2</mn>
</msub>
</mrow>
<mrow>
<msub>
<mi>a</mi>
<mn>1</mn>
</msub>
<mo>+</mo>
<mn>2</mn>
<msub>
<mi>a</mi>
<mn>2</mn>
</msub>
</mrow>
</mfrac>
<mo>)</mo>
</mrow>
<mn>2</mn>
</msup>
<mo>+</mo>
<mn>2</mn>
</mrow>
</msqrt>
</mrow>
In formula, a1Represent the number that user is paid close attention to by doubtful normal users, a2Represent the number that user is paid close attention to by approximate normal users
Mesh, b1Represent that user pays close attention to the number of doubtful junk user, b2Represent that user pays close attention to the number of approximate junk user;
(2) if user is approximate junk user and meets user's score DF>0.2, if user is doubtful junk user and meets to use
Family score DF>0.5, if user is uncertain user and meets user's score DF>1, if user is doubtful normal users and satisfaction
User's score DF>2, if user is approximate normal users and meets user's score DF>4, then user is defined as junk user, it is no
It is then normal users.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710582712.2A CN107370664A (en) | 2017-07-17 | 2017-07-17 | A kind of effective microblogging junk user finds system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710582712.2A CN107370664A (en) | 2017-07-17 | 2017-07-17 | A kind of effective microblogging junk user finds system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107370664A true CN107370664A (en) | 2017-11-21 |
Family
ID=60308469
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710582712.2A Pending CN107370664A (en) | 2017-07-17 | 2017-07-17 | A kind of effective microblogging junk user finds system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107370664A (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102663101A (en) * | 2012-04-13 | 2012-09-12 | 北京交通大学 | Sina microblog-based user grade sequencing algorithm |
CN103049440A (en) * | 2011-10-11 | 2013-04-17 | 腾讯科技(深圳)有限公司 | Recommendation processing method and processing system for related articles |
CN103593398A (en) * | 2013-10-12 | 2014-02-19 | 北京奇虎科技有限公司 | Method and equipment for updating microblog user library |
US20150019565A1 (en) * | 2013-07-11 | 2015-01-15 | Outside Intelligence Inc. | Method And System For Scoring Credibility Of Information Sources |
CN105005594A (en) * | 2015-06-29 | 2015-10-28 | 嘉兴慧康智能科技有限公司 | Abnormal Weibo user identification method |
CN106296422A (en) * | 2016-07-29 | 2017-01-04 | 重庆邮电大学 | A kind of social networks junk user detection method merging many algorithms |
CN106776881A (en) * | 2016-11-28 | 2017-05-31 | 中国科学院软件研究所 | A kind of realm information commending system and method based on microblog |
-
2017
- 2017-07-17 CN CN201710582712.2A patent/CN107370664A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103049440A (en) * | 2011-10-11 | 2013-04-17 | 腾讯科技(深圳)有限公司 | Recommendation processing method and processing system for related articles |
CN102663101A (en) * | 2012-04-13 | 2012-09-12 | 北京交通大学 | Sina microblog-based user grade sequencing algorithm |
US20150019565A1 (en) * | 2013-07-11 | 2015-01-15 | Outside Intelligence Inc. | Method And System For Scoring Credibility Of Information Sources |
US20160364392A1 (en) * | 2013-07-11 | 2016-12-15 | Outside Intelligence Inc. | Method and system for scoring credibility of information sources |
CN103593398A (en) * | 2013-10-12 | 2014-02-19 | 北京奇虎科技有限公司 | Method and equipment for updating microblog user library |
CN105005594A (en) * | 2015-06-29 | 2015-10-28 | 嘉兴慧康智能科技有限公司 | Abnormal Weibo user identification method |
CN106296422A (en) * | 2016-07-29 | 2017-01-04 | 重庆邮电大学 | A kind of social networks junk user detection method merging many algorithms |
CN106776881A (en) * | 2016-11-28 | 2017-05-31 | 中国科学院软件研究所 | A kind of realm information commending system and method based on microblog |
Non-Patent Citations (1)
Title |
---|
丁兆云等: "微博中基于统计特征与双向投票的垃圾用户发现", 《计算机研究与发展》 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Dahal et al. | Topic modeling and sentiment analysis of global climate change tweets | |
CN103647800B (en) | Recommend the method and system of application resource | |
Gilbert et al. | The network in the garden: an empirical analysis of social media in rural life | |
Cheng et al. | A destination choice model for hurricane evacuation | |
Van Liere | How far does a tweet travel? Information brokers in the Twitterverse | |
CN102609460B (en) | Method and system for microblog data acquisition | |
CN108924333A (en) | Fraudulent call recognition methods, device and system | |
CN106951446B (en) | Financial Information method for pushing and device | |
CN102044009A (en) | Group recommending method and system | |
CN101784022A (en) | Method and system for filtering and classifying short messages | |
CN102572744B (en) | Recognition feature library acquisition method and device as well as short message identification method and device | |
CN104023109A (en) | Incoming call prompt method and device as well as incoming call classifying method and device | |
CN106656732A (en) | Scene information-based method and device for obtaining chat reply content | |
CN106570763A (en) | User influence evaluation method and system | |
CN103279483B (en) | A kind of topic Epidemic Scope appraisal procedure towards micro-blog and system | |
Taylor et al. | A twenty-first century graffiti classification system: A typological tool for prioritizing graffiti removal | |
CN112035603A (en) | Propagation influence evaluation method for comprehensive calculation event | |
CN102750288B (en) | A kind of internet content recommend method and device | |
CN103699546A (en) | Method and device of generating IP (Internet Protocol) database of internet bar | |
Walker et al. | The relationship of household proximity to park use | |
CN103778160B (en) | A kind of traffic information service method based on social networks | |
CN107370664A (en) | A kind of effective microblogging junk user finds system | |
Savoie | Neighbourhood Characteristics and the Distribution of Crime, Edmonton, Halifax and Thunder Bay | |
CN107315838A (en) | A kind of efficient network hotspot digging system | |
Pfeiffer et al. | A typology of end users’ willingness to share energy data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171121 |
|
RJ01 | Rejection of invention patent application after publication |